0% found this document useful (0 votes)
31 views

Module 4

The document discusses cyber laws and the Information Technology Act of 2000 in India. It defines cyber threats and types of cyber crimes such as hacking, email bombing, and denial of service attacks. It outlines the objectives of the IT Act in providing legal recognition to electronic transactions and documents. Important provisions of the Act regarding electronic records, digital signatures, data retention are summarized. Various cyber-related offenses under the IT Act and Indian Penal Code are also highlighted including hacking, publishing private images, and data theft.

Uploaded by

vighnesh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Module 4

The document discusses cyber laws and the Information Technology Act of 2000 in India. It defines cyber threats and types of cyber crimes such as hacking, email bombing, and denial of service attacks. It outlines the objectives of the IT Act in providing legal recognition to electronic transactions and documents. Important provisions of the Act regarding electronic records, digital signatures, data retention are summarized. Various cyber-related offenses under the IT Act and Indian Penal Code are also highlighted including hacking, publishing private images, and data theft.

Uploaded by

vighnesh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

CYBER LAWS

&
IT ACT 2000

1
What is a cyber threat?

• From the information security perspective, a ‘threat ‘ is defined as the


potential to cause an unwanted incident in which an asset, system or
organisation may be harmed.

• ‘Cyber threat ‘ is a threat that percolates or infiltrates through the use of


computers , internet or interconnected communication devices and could
comprise of information stealth, cyber warfare, virus attacks, cyber
terrorism, hacking attempts , phising,sabotage, singly or in combination.

2
TYPES OF CYBER CRIMES

Cyber crimes

Web jacking

Denial of
Information E-mail Salami Trojan
Hacking Service
Theft bombing attacks attacks
attacks

3
Cyber Law?
Cyber Law is the law governing cyber space.

Encompasses laws relating to:

• Cyber Crimes
• Electronic and Digital Signatures
• Intellectual Property
• Data Protection and Privacy

4
Need for Cyber Law
Cyberspace

• Intangible.
• disrespect for jurisdictional boundaries.
• gigantic traffic volumes every second
• open to participation
• enormous potential for anonymity
• extreme mobility

5
Information Technology Act, 2000
• Enacted on 17th May
2000- India is 12th
nation in the world to
adopt cyber laws
• IT Act is based on
Model law on
e-commerce adopted by
UNCITRAL(un
COMMISSION ON
INTL.TRADE LAW)
6
Objectives of the IT Act
To provide legal recognition for transactions:-
• Carried out by means of electronic data interchange, and other
means of electronic communication, commonly referred to as
"electronic commerce“
• To facilitate electronic filing of documents with Government
agencies and E-Payments
• To amend the Indian Penal Code, Indian Evidence Act,1872,
the Banker’s Books Evidence Act 1891,Reserve Bank of India
Act ,1934

7
Important provisions of IT Act, 2000
• Legal recognition to electronic records- Section 4 of
IT Act.
• Legal recognition of digital signatures- Section 5 of
IT Act, 2000
• Section 6- Use of electronic records and digital
signatures in Government and its agencies.
• Section 7- Retention of electronic records
1. Information should remain accessible for subsequent
reference
2. Retained in a format that ensures accuracy
3. Details of dispatch and receipt are available.

8
Offences & Relevant Sections under IT Act

Tampering with CompuTer source documents Sec.65


Hacking with Computer systems, Data alteration Sec.66
Receiving stolen computer or communication device Sec 66B
Using password of another person Sec 66C
Cheating using computer resource Sec 66D
Publishing private images of others Sec 66E
Act of cyber terrorism Sec 66F
Publishing obscene information Sec.67
Un-authorized access to protected system Sec.70
Breach of Confidentiality and Privacy Sec.72
Publishing false digital signature certificates Sec.73

9
Data theft
According to the section 2 of Information Technology Act,

“Data” means a representation of information, knowledge, facts,


concepts or instruction which are being prepared or have been prepared
in a formalised manner, and is intended to be processed, is being
processed or has been processed in a computer system or computer
network, and may be in any form (including computer printouts magnetic
or optical storage media, punched cards, punched tapes) or stored
internally in the memory of the computer.

“Data Theft”- It is the term used when any information in the form of data
is illegally copied or taken from a business or other individual without his
knowledge or consent.

10
Computer Related Crimes under IPC and
Special Laws
Sending threatening messages by email Sec 503 IPC
Sending defamatory messages by email Sec 499, 500 IPC

Forgery of electronic records Sec 463, 470, 471 IPC

Bogus websites, cyber frauds Sec 420 IPC


Email spoofing Sec 416, 417, 463 IPC

Online sale of Drugs NDPS Act


Web - Jacking Sec. 383 IPC
Online sale of Arms Arms Act

11
Section 65: Source Code
• Most important asset of software companies
• “Computer Source Code" means the listing of
programmes, computer commands, design and layout
• Ingredients
– Knowledge or intention
– Concealment, destruction, alteration
– computer source code required to be kept or
maintained by law
• Punishment
– imprisonment up to three years and / or
– fine up to Rs. 2 lakh
12
Section 66: Hacking

• Ingredient
s– Intention or Knowledge to cause wrongful loss
or damage to the public or any
– person
Destruction, deletion, alteration, diminishing
value or utility or injuriously affecting
information residing in a computer
resource
• Punishmen
t– imprisonment up to three years, and / or
– fine up to Rs. 2
lakh
• Cognizable, Non Bailable,
Section 66 covers data theft aswell as data alteration

13
[1.] The Information Technology Act, Author: S.R. Bhansali
[2.] Internet Law, Author: Rodney D. Ryder
[3.] Information Technology Law and Practice, Author: Vakul
Sharma
[4.] International Journal of Law and Information Technology
[5.] Indian Journal of Law [Manupatra]
[6.] https://www.computerhope.com/jargon/c/cyber-law.htm
[7.] https://en.wikipedia.org/wiki/IT_law
[8.] https://www.meity.gov.in/content/cyber-laws

CIL Test Study material 14

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy